DocumentCode :
2020422
Title :
Locating malicious nodes for data aggregation in wireless networks
Author :
Xu, Xiaohua ; Wang, Qian ; Cao, Jiannong ; Wan, Peng-Jun ; Ren, Kui ; Chen, Yuanfang
Author_Institution :
Dept. of Comput. Sci., Illinois Inst. of Technol., Chicago, IL, USA
fYear :
2012
fDate :
25-30 March 2012
Firstpage :
3056
Lastpage :
3060
Abstract :
Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
Keywords :
radio networks; security of data; telecommunication security; communication complexity; data aggregation; in-network aggregation; malicious nodes; primitive communication task; security scheme; unavoidable security defect; whole network data; wireless networks; Aggregates; Communication system security; Protocols; Security; Wireless networks; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2012 Proceedings IEEE
Conference_Location :
Orlando, FL
ISSN :
0743-166X
Print_ISBN :
978-1-4673-0773-4
Type :
conf
DOI :
10.1109/INFCOM.2012.6195758
Filename :
6195758
Link To Document :
بازگشت